Post navigation

[Canada: 10 January 2018] Canada’s first funicular, officially named ‘the 100 Street Funicular and Frederick G. Todd Lookout’, has now opened as an attraction to members of the public in downtown Edmonton. Designed in its entirety by Dialog Design, this $24 million project has been publically funded to improve access to Edmonton’s river valley – the city’s largest and publicly accessible green space. Kebony, a beautiful wood recommended by leading architects, was consciously selected for the funicular stairs, cladding and boardwalk owing to its hardwearing and environmentally friendly nature.

Mortgage possession claims and orders rise – by 6% and 26% respectively.
Middlesbrough, Oldham and Thurrock are “most at risk” of possession claims.
Mortgage arrears: the biggest source of debt for UK homeowners.

NEW DATA released by the Ministry of Justice reports the number of mortgage possession claims and orders made in county courts has increased in the last 6 months. Sellhousefast.uk, who help homeowners with the prospect of repossession, decided to investigate this issue, to determine which local authorities in England and Wales are most at risk.

_______________________________________________________________________________________________________________________
• 53% of businesses surveyed by EY say their cyber security budget has increased over the last year
• Two thirds of businesses cite ‘customer personal and identifiable information’ as the most valuable asset to protect
• The average spend on cyber security for businesses in the UK is £4,590 per year
_______________________________________________________________________________________________________________________
In an age of technology, cyber-attacks are becoming more prevalent, more frequent and more threatening than ever before. Now that the majority of institutions, particularly in the financial sector, are opting to transform their operations via new digital channels, automation and other advanced technologies, the dangers to companies are significantly heightened.

AlienVault labs recently analysed an application compiled on Christmas Eve 2017. It is an Installer for software to mine the Monero crypto-currency. Any mined currency is sent to Kim Il Sung University in Pyongyang, North Korea.

CAMBRIDGE, ONTARIO – January 8, 2018 – Rudimentary attacks, like information gathering, reputation blocks, fraud, and brute force attacks, increased by 71% from 2016-2017, according to new data released by eSentire, Inc., the largest pure-play Managed Detection and Response (MDR) provider. The data represents a total volume rise in detected events from 15 million in 2016, to 21 million last year.

Next Generation Smart Device to redefine mobility experience in the coming era of autonomous driving

Las Vegas, – January 8, 2018 – BYTON today debuted its first drivable concept car at the International Consumer Electronics Show (CES) in Las Vegas, U.S.A. With a unique digital design and innovative human-vehicle interaction, the premium SUV functions as a Next Generation Smart Device, built for the coming era of truly shared, smart mobility and autonomous driving.

Recently it was discovered that a Department of Homeland Security (DHS) / Office of the Inspector General (OIG) employee was in possession of a file that contained nearly a quarter of a million – that’s right, 250,000 records of people employed by DHS as well as subjects, witnesses and complainants associated with ongoing investigations from 2002 – 2014. The data included social security numbers, dates of birth, positions, grades and duty stations. Commenting, Daniel Conrad, Identity and Access Management Specialist, One Identity, said:

Security alerts from specialists often provide a warning of potential threats which may not affect every user of that hardware/firmware/software. How big a threat any vulnerability may create depends on many factors of which a key factor will be the potential value to a hacker of gaining access to particular users and systems. As professional hackers are patient and methodical, no piece of illegally acquired code/information should be lightly dismissed because one vulnerability provides knowledge of a system for further exploits – Ed

It was revealed that nearly all computers worldwide and many devices have been exposed to security flaws leaving them vulnerable to attacks by hackers.